• Neu
Matulevicius / Matulevicius / Kamm | Secure IT Systems | E-Book | www.sack.de
E-Book

E-Book, Englisch, 560 Seiten

Reihe: Computer Science

Matulevicius / Matulevicius / Kamm Secure IT Systems

30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings
Erscheinungsjahr 2026
ISBN: 978-3-032-14782-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings

E-Book, Englisch, 560 Seiten

Reihe: Computer Science

ISBN: 978-3-032-14782-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.

The 29 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Cryptography; Artificial Intelligence and Software Security; Network and Communication Security; System and Hardware Security; Threat Analysis; Access Control and Policy Management; Usable Security and Societal Resilience; and Obfuscation.

Matulevicius / Matulevicius / Kamm Secure IT Systems jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Cryptography .

.- DDH-Based Schemes for Multi-Party Function Secret Sharing.

.- Integrating PQC in OpenSSL via Shallow Providers for Cryptographic Agility.

.- Attacking an RSA-like Cryptosystem Using Continued Fractions and Lattices.

.- A Comparative Software Benchmark of Lightweight Hash Functions on 8-bit AVR Using ChipWhisperer.

.- A New Optimized Implementation of SMAUG-T for Lightweight Devices.

.- Exploiting Quantum Point-to-Point Protocol (Q3P) for Denial-of- Service (DoS) Attacks.

.- Artificial Intelligence and Software Security .

.- OHRA: Dynamic Multi-Protocol LLM-Based Cyber Deception.

.- Targeted AI-Based Password Guessing Leveraging Email-Derived User Attributes.

.- On the Security and Privacy of AI-based Mobile Health Chatbots.

.- Fairness Under Noise: How Di!erential Privacy A!ects Bias in GANs-Generated Data.

.- GadgetBuilder: An Overhaul of the Greatest Java Deserialization Exploitation Tool.

.- Software Supply Chain Security: Can We Beat the Kill-Chain? A Case Study on the XZ Backdoor.

.- Network and Communication Security .

.- MP-LFM: Breaking Subscriber Privacy (even more) by Exploiting Linkability in 5G AKA.

.- Mitigating Tra”c Analysis Attacks While Maintaining On-Path Network Observability.

.- Privacy and Security of DNS Resolvers used in the Nordics and Baltics.

.- System and Hardware Security .

.- WireTrust: A TrustZone-Based Non-Bypassable VPN Tunnel.

.- Timing Interference in Multi-Core RISC-V Systems: Security Risks and Mitigations.

.- A Walk Down Memory Lane: Timing Analysis of Load and Store Instructions on ARM Cortex-M3 Devices.

.- Threat Analysis .

.- An Empirical Evaluation of Intrusion Detection Systems Based on System Calls.

.- Dissecting Mirai: Spatio-Sequential Analysis and Restoration Strategies Using MITRE ATT&CK and D3FEND.

.- Graph Reduction to Attack Trees for (Unobservable) Target Analysis.

.- Access Control and Policy Management .

.- Threshold Trust Logic.

.- Mining Attribute-Based Access Control Policies via Categorisation.

.- Multi-entity Control-Based Risk Assessment: A European Digital Identity Wallet Use Case.

.- Usable Security and Societal Resilience .

.- From Perception to Protection: A Mental Model-Based Framework for Capturing Usable Security and Privacy Requirements.

.- Understanding APT Defense Through Expert Eyes: A Critical Exploration of Perceived Needs and Gaps.

.- Foreign Disinformation on Swedish Facebook: A Mixed-Methods Thematic Analysis of Manipulative Narratives and Societal Resilience.

.- Obfuscation .

.- Key-Gated Generative Obfuscation for Embedded Strings.

.- Bugfuscation.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.